Keywords:
Artificial intelligence.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (711 pages)
Edition:
1st ed.
ISBN:
9783319286587
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.425
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=4207029
DDC:
621.3822
Language:
English
Note:
Intro -- Preface -- Organization -- Contents -- Biometrics/Digital Watermarking/Recognition Systems -- Emotion Recognition from Facial Expressions for 4D Videos Using Geometric Approach -- 1 Introduction -- 2 Background Work -- 3 Proposed Method -- 3.1 Automatic Peak Detection -- 3.2 Feature Extraction -- 3.3 Classification Using Support Vector Machine -- 3.4 Classification Using Random Forests -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Fraudulent Image Recognition Using Stable Inherent Feature -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Image Splicing Detection -- 3.2 Copy-Move Forgery Detection -- 4 Experiment Re esults and Comparisons -- 4.1 Choosing of Denoising Filter -- 4.2 Component De etection -- 4.3 Copy-Move Fo rgery Detection -- 4.4 After JPEG Co ompression -- 5 Conclusion and Future Works -- References -- Kernel Visual Keyword Description for Object and Place Recognition -- 1 Introduction& -- -- 2 Related Works -- 3 SURF and PCA -- 4 SURF Features -- 5 Histogram of Gradient -- 6 Combining KPCA and HOG Naively -- 7 Classification and Optimization -- 8 Simulation and Implementation -- 8.1 IDOL Dataset -- 8.2 Caltech101 Dataset -- 9 Discussion -- 10 Conclusion -- References -- Hardware Accelerator for Facial Expression Classification Using Linear SVM -- 1 Introduction -- 2 Software Implementation of OVA Linear SVM -- 2.1 Classifier Training and Testing Using LibSVM Library -- 3 Proposed Hardware Architecture of OVA Linear SVM -- 3.1 Input Feature Storage Block -- 3.2 Support Vector Storage Block -- 3.3 Yalpha Values Storage Block -- 3.4 Kernel Computation Block -- 3.5 Temporary Storage Block -- 3.6 Counters Block -- 3.7 Decision Value Computation Block -- 3.8 Decision Function and SVM Classification Block -- 3.9 Controller Block -- 4 Simulation and Synthesis Result -- 5 Conclusion.
,
References -- Enhancing Face Recognition Under Unconstrained Background Clutter Using Color Based Segmentation -- 1 Introduction -- 2 Face Recognition Algorithms -- 2.1 Eigenfaces -- 2.2 2-Dimensional PCA -- 2.3 Row Column 2DPCA (RC2DPCA) -- 2.4 Other Forms of PCA -- 3 Color Segmentation -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- Emotion Recognition from 3D Images with Non-Frontal View Using Geometric Approach -- 1 Introduction -- 2 Background Work -- 3 Proposed Methods for Emotion Recognition -- 3.1 Distance and Angle Vector Method -- 3.2 Normalized Euclidean Distance Method -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Real-Time Automatic Camera Sabotage Detection for Surveillance Systems -- 1 Introduction -- 2 Related Works -- 3 Background Modelling -- 3.1 Development of Background Model -- 3.2 Object Extraction -- 4 Proposed Method -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Scope -- References -- An Improved Approach to Crowd Event Detection by Reducing Data Dimensions -- 1 Introduction -- 2 Related Work -- 2.1 Dimensionality Reduction Methods -- 2.2 Crowd Event Detection -- 3 Methodology -- 3.1 Preprocessing and Feature Extraction -- 3.2 Haar Wavelet Transform -- 3.3 Dimensionality Reduction and Classification -- 4 Results and Discussion -- 4.1 Dataset -- 4.2 Experiment -- 5 Conclusion -- References -- Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight's Tour Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Encryption and Embedding Phase -- 2.2 Extraction and Decryption Phase -- 3 Results and Discussions -- 4 Conclusions -- References -- Digital Watermarking Using Fractal Coding -- 1 Introduction -- 2 Proposed Meth hod -- 2.1 Procedure for E Embedding Watermark -- 2.2 Procedure for W Watermark Extraction.
,
3 Experimental R Results -- 4 Conclusion -- References -- A Cheque Watermarking System Using Singular Value Decomposition for Copyright Protection of Cheque Images -- 1 Introduction -- 2 Various Technique Used For Digital Image Watermarking -- 2.1 Frequency Domain -- 2.2 Computational Intelligence Techniques -- 2.3 Spatial Domain -- 3 Working of Singular Valued Decomposition Transform -- 3.1 Singular Valued Decomposition Transform -- 3.2 Watermark Embedding Algorithm Using Singular Value Decomposition Transform -- 3.3 Watermark Extraction Algorithm Using Singular Value Decomposition Transform -- 4 Calculating Imperceptibility of Watermarked Cheque Image -- 5 Experiment and Results -- 5.1 For Gain Facto or or value of alpha as constant =1 -- 6 Conclusion -- References -- Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection -- 1 Introduction -- 2 Fast Discrete Curvelet Transform (FDCT) -- 3 Proposed Watermarking Technique -- 3.1 Watermark Preparation and Embedding -- 3.2 Watermark Extraction and Reconstruction -- 4 Experimental Results and Discussion -- 5 Effect of Proposed Watermarking Technique for Performance of Multibiometric System -- 6 Conclusion -- References -- Cancelable Fingerprint Cryptosystem Based on Convolution Coding -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Fingerprint Image Preprocessing and Feature Extraction -- 3.2 Computation of Transformed Features Using Delaunay Triangulation Net Constructed from Minutiae Points -- 3.3 Representing the Transformed Features as Fixed Length Bit Strings -- 3.4 Encode the Bit String Using Convolution Coding in Fuzzy Commitment Scheme -- 3.5 Convolution Coding and Decoding -- 3.6 Fuzzy Commitment Scheme -- 3.7 Matching -- 4 Experiment, Analysis and Discussion -- 4.1 Accuracy -- 4.2 Changeability.
,
4.3 Security Analysis -- 5 Performance Comparison with Existing Fingerprint Template Protection Schemes -- 6 Conclusion -- References -- A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Computation of Delaunay Neighbor Structures(DNS) from Fingerprint Minutiae -- 3.2 Computation of Bit String for Each DNS -- 3.3 Apply Dimensionality Reduction Matrix to Each Bit String -- 3.4 Encode Each Bit String Using BCH Code in Fuzzy Commitment Scheme -- 3.5 Matching -- 4 Experiment, Analysis and Discussion -- 4.1 Experiment Setup and Performance Measures -- 4.2 Accuracy -- 4.3 Revocability -- 4.4 Security Analysis -- 5 Performance Comparison with Existing Fingerprint Template Protection Schemes -- 6 Conclusion -- References -- Part II Image/ Video Processing -- Improving the Feature Stability and Classification Performance of Bimodal Brain and Heart Biometrics& -- -- 1 Introduction -- 2 Methodology -- 2.1 ECG Signal Processing -- 2.2 EEG Signal Processing -- 2.3 Classification -- 3 Results and Discussion -- 4 Conclusion -- References -- Denoising Multi-coil Magnetic Resonance Imaging Using Nonlocal Means on Extended LMMSE -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusion -- Appendix 1. Nonlocal Means method -- Appendix 2. Extended LMMSE Method -- Appendix 3. Mean Squared Error -- Appendix 4. Peak Signal to Noise Ratio -- References -- An Intelligent Blind Semi-fragile Watermarking Scheme for Effective Authentication and Tamper Detection of Digital Images Using Curvelet Transforms -- 1 Introduction -- 2 Discrete Curvelet Transform -- 3 Proposed Semi-fragile Watermarking Scheme -- 3.1 Watermark Embedding -- 3.2 Watermark Extraction -- 4 Experimental Results -- 5 Discussions.
,
5.1 Robustness Analysis -- 5.2 Fragility Analy ysis -- 6 Conclusions -- References -- Dental Image Retrieval Using Fused Local Binary Pattern & -- Scale Invariant Feature Transform -- 1 Introduction -- 2 Literature Survey -- 3 Feature Extraction Methods -- 3.1 Local Binary Pattern (LBP) -- 3.2 Scale Invariant Feature Transform (SIFT) -- 4 Proposed Methodology Fused LBP and SIFT -- 4.1 Image Retrieval Using Similarity Measures -- 4.2 Dental Image Retrieval Process -- 5 Experimental Results -- 6 Conclusion -- References -- Block Based Variable Step Size LMS Adaptive Algorithm for Reducing Artifacts in the Telecadiology System -- 1 Introduction -- 2 Basic Least Mean Square (LMS) Adaptive Algorithm -- 3 Proposed Block Based Error Data Normalized VSSLMS Algorithm -- 4 Simulation Analysis -- 5 Conclusion -- References -- Braille Tutor -- A Gift for the Blind -- 1 Introduction -- 2 Methodology -- 2.1 Description -- 3 Implementation -- 4 Results and Evaluation -- 5 Conclusion -- References -- Performance Evaluation of S-Golay and MA Filter on the Basis ofWhite and Flicker Noise -- 1 Introduction -- 2 Synthesis of Synthetic EEG Signal -- 3 Addition of White and Pink Noise in the Synthetic EEG Signal -- 4 Application of Savitzy-Golay Filter to the Noisy Signal -- 5 Moving Average Filter -- 6 Signal to Noise Ratio(SNR) of EEG Signal -- 7 Evaluation of Signal Distortion -- 8 Peak Detection -- 9 Application of Filters on Real EEG Signal -- 10 Results and Discussion -- 11 Conclusion -- References -- An Efficient Multi Object Image Retrieval System Using Multiple Features and SVM -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparing the Database -- 2.2 Feature Extraction -- 3 Support Vector Machine -- 4 Results -- 5 Discussions -- References.
,
Blood Cells Counting by Dynamic Area-Averaging Using Morphological Operations to SEM Images of Cancerous Blood Cells.
Permalink